×

System and method for enforcing location privacy using rights management

  • US 7,503,074 B2
  • Filed: 08/27/2004
  • Issued: 03/10/2009
  • Est. Priority Date: 08/27/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A location information server configured to securely deliver location information of a mobile device to a location consumer, the location information server comprising:

  • a processor; and

    a memory storing executable instructions which, when executed by the location information server, and in response to receiving a location request, cause the location information server to;

    validate that the location request is authorized by the mobile device user, the location request including a license, wherein the license includes access conditions that identify conditions upon which the location consumer is authorized to access the location information of the mobile device, the access conditions comprising conditions of use based on at least one of the following;

    a number of usages for which the license is valid,at least one location for which the license is valid, andat least one application for which the license is valid; and

    determine whether the license is valid, wherein determining whether the license is valid comprises;

    verifying validity of a public key associated with the mobile device,verifying validity of a identity certificate associated with the location consumer,verifying validity of the access conditions associated with the license, anddetermining if the license if one of;

    suspended and expired; and

    obtain the location information of the mobile device if the location request is authorized by the mobile device user;

    generate a location response, including the location information, if the location request is authorized by the mobile device user, wherein generating the location response comprises;

    diluting specificity of the location information,identifying one of;

    geographic regions and areas in which the mobile device is located,specifying which applications may use the location information, encrypting the location information in the location response; and

    return the location response to the location consumer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×